[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] more additions to the website



Update of /home2/or/cvsroot/website
In directory moria.mit.edu:/home2/arma/work/onion/cvs/website

Modified Files:
	contribute.html index.html research.html 
Log Message:
more additions to the website


Index: contribute.html
===================================================================
RCS file: /home2/or/cvsroot/website/contribute.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -d -r1.28 -r1.29
--- contribute.html	1 Feb 2005 03:46:57 -0000	1.28
+++ contribute.html	26 Feb 2005 08:29:56 -0000	1.29
@@ -54,6 +54,8 @@
 server</a> to help with development and scalability.</li>
 <li>Does somebody want to help maintain this website, or help with
 documentation, or help with managing our TODO and handling bug reports?</li>
+<li>It would be nice to translate the documentation and other web pages
+into other languages. (E.g. <a href="http://tor.freesuperhost.com/";>Persian</a>)</li>
 <li>Please fix up <a
 href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ";>the FAQ Wiki</a>,
 and if you know the answer to a question in the "unanswered FAQs" list,

Index: index.html
===================================================================
RCS file: /home2/or/cvsroot/website/index.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -d -r1.49 -r1.50
--- index.html	23 Feb 2005 23:31:23 -0000	1.49
+++ index.html	26 Feb 2005 08:29:56 -0000	1.50
@@ -109,8 +109,13 @@
 href="cvs/tor/doc/tor-doc.html#installing">installing it</a> and then
 <a href="cvs/tor/doc/tor-doc.html#server">helping out</a>. You can also
 <a href="documentation.html">learn more about Tor here</a>.
-We also welcome research into the security of Tor and related anonymity
-systems, and want to hear about any vulnerabilities you find.
+</p>
+
+<p>
+Part of the goal of the Tor project is to deploy a public testbed for
+experimenting with design trade-offs, to teach us how best to provide
+privacy online. We welcome research into the security of Tor and related
+anonymity systems, and want to hear about any vulnerabilities you find.
 </p>
 
 <p>

Index: research.html
===================================================================
RCS file: /home2/or/cvsroot/website/research.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -d -r1.12 -r1.13
--- research.html	4 Jan 2005 22:45:44 -0000	1.12
+++ research.html	26 Feb 2005 08:29:56 -0000	1.13
@@ -47,7 +47,24 @@
 papers</a> (especially the ones in boxes) to get up to speed on anonymous
 communication systems.</p>
 
-<p>More here coming soon.</p>
+<p>We need people to attack the system, quantify defenses, etc. For example:
+</p>
+<ul>
+<li>Website volume fingerprinting attacks (<a
+href="http://freehaven.net/anonbib/#back01";>Back et al</a>, <a
+href="http://freehaven.net/anonbib/#hintz02";>Hintz</a>).
+Defenses include a large cell size, <a
+href="http://freehaven.net/anonbib/#timing-fc2004";>defensive dropping</a>,
+etc. How well does each approach work?</li>
+<li>The end-to-end traffic confirmation attack. We need to study
+long-range dummies more, along with traffic shaping. How much traffic
+of what sort of distribution is needed before the adversary is confident
+he has won?</li>
+<li>It's not that hard to DoS Tor servers or dirservers. Are puzzles
+the right answer? What other practical approaches are there?</li>
+<li>What sensitive info squeaks by privoxy? Are other html scrubbers
+better?</li>
+</ul>
 
   </div><!-- #main -->
 </div>